joingrubwahots.duckdns.org Open in urlscan Pro
52.139.208.183  Malicious Activity! Public Scan

URL: http://joingrubwahots.duckdns.org/
Submission: On September 15 via automatic, source openphish — Scanned from DE

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 5 HTTP transactions. The main IP is 52.139.208.183, located in Singapore, Singapore and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is joingrubwahots.duckdns.org.
This is the only time joingrubwahots.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
3 52.139.208.183 8075 (MICROSOFT...)
1 2 185.60.218.53 32934 (FACEBOOK)
1 104.243.37.149 23470 (RELIABLESITE)
5 3
Apex Domain
Subdomains
Transfer
3 duckdns.org
joingrubwahots.duckdns.org
71 KB
1 ibb.co
i.ibb.co
12 KB
1 whatsapp.com
www.whatsapp.com
1 whatsapp.net
www-cdn.whatsapp.net
182 B
5 4
Domain Requested by
3 joingrubwahots.duckdns.org joingrubwahots.duckdns.org
1 i.ibb.co
1 www.whatsapp.com joingrubwahots.duckdns.org
1 www-cdn.whatsapp.net 1 redirects
5 4
Subject Issuer Validity Valid
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2021-08-28 -
2021-11-26
3 months crt.sh
ibb.co
R3
2021-08-06 -
2021-11-04
3 months crt.sh

This page contains 1 frames:

Primary Page: http://joingrubwahots.duckdns.org/
Frame ID: 976AF44B5A1E60AEF3BF4F8089C9677C
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

WhatsApp Group Invite

Page Statistics

5
Requests

40 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

83 kB
Transfer

279 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
joingrubwahots.duckdns.org/
7 KB
2 KB
Document
General
Full URL
http://joingrubwahots.duckdns.org/
Protocol
HTTP/1.1
Server
52.139.208.183 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
LiteSpeed /
Resource Hash
f6537ff1b5e4d1bef16c2d0d9510615063eb93ff22e03d5dc0306e40f072e4a6

Request headers

Host
joingrubwahots.duckdns.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
content-type
text/html; charset=UTF-8
content-length
1863
content-encoding
gzip
vary
Accept-Encoding
date
Wed, 15 Sep 2021 13:21:47 GMT
server
LiteSpeed
style.build35e635e635e6.css
joingrubwahots.duckdns.org/css/v4/
240 KB
49 KB
Stylesheet
General
Full URL
http://joingrubwahots.duckdns.org/css/v4/style.build35e635e635e6.css
Requested by
Host: joingrubwahots.duckdns.org
URL: http://joingrubwahots.duckdns.org/
Protocol
HTTP/1.1
Server
52.139.208.183 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
LiteSpeed /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
joingrubwahots.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://joingrubwahots.duckdns.org/
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://joingrubwahots.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Wed, 15 Sep 2021 13:21:47 GMT
content-encoding
gzip
last-modified
Fri, 02 Jul 2021 13:30:30 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=604800
Connection
Keep-Alive
accept-ranges
bytes
Keep-Alive
timeout=5, max=100
content-length
49325
expires
Wed, 22 Sep 2021 13:21:47 GMT
whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: joingrubwahots.duckdns.org
URL: http://joingrubwahots.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.60.218.53 Bucharest, Romania, ASN32934 (FACEBOOK, US),
Reverse DNS
whatsapp-cdn-shv-01-otp1.fbcdn.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://joingrubwahots.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Redirect headers

location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
date
Wed, 15 Sep 2021 13:21:48 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
alt-svc
h3=":443"; ma=3600,h3-29=":443"; ma=3600,h3-27=":443"; ma=3600
content-length
0
content-type
text/plain
icon-chat.png
joingrubwahots.duckdns.org/img/v4/
20 KB
20 KB
Image
General
Full URL
http://joingrubwahots.duckdns.org/img/v4/icon-chat.png
Requested by
Host: joingrubwahots.duckdns.org
URL: http://joingrubwahots.duckdns.org/css/v4/style.build35e635e635e6.css
Protocol
HTTP/1.1
Server
52.139.208.183 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
LiteSpeed /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
joingrubwahots.duckdns.org
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://joingrubwahots.duckdns.org/css/v4/style.build35e635e635e6.css
Connection
keep-alive
Cache-Control
no-cache
Accept-Language
de-DE,de;q=0.9
Referer
http://joingrubwahots.duckdns.org/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Wed, 15 Sep 2021 13:21:48 GMT
last-modified
Fri, 02 Jul 2021 13:30:30 GMT
server
LiteSpeed
content-type
image/png
cache-control
public, max-age=604800
Connection
Keep-Alive
accept-ranges
bytes
Keep-Alive
timeout=5, max=100
content-length
20384
expires
Wed, 22 Sep 2021 13:21:48 GMT
IMG-20210702-185444.jpg
i.ibb.co/zGQCbDX/
12 KB
12 KB
Image
General
Full URL
https://i.ibb.co/zGQCbDX/IMG-20210702-185444.jpg
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.243.37.149 , United States, ASN23470 (RELIABLESITE, US),
Reverse DNS
Software
nginx /
Resource Hash
1aba5e0d7b5b85c7f11bd947b8b4e06c6a982c0380125bc4bdbd763f867cf818

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://joingrubwahots.duckdns.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Wed, 15 Sep 2021 13:21:48 GMT
last-modified
Fri, 02 Jul 2021 13:40:49 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
11841
expires
Thu, 31 Dec 2037 23:55:55 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Message:
Failed to load resource: the server responded with a status of 404 ()